You work as a network administrator for a college located in your local city. Next door to the college is a new gated community. The residents have being moving in over the last few months. The college is running a converged network. The services that are present on the infrastructure include the phone system that all staff and faculty use to make calls (voice network). The data for students and faculty are also present on the infrastructure. The infrastructure includes a student-accessible wireless environment.
You have gotten numerous complaints about call quality. Complaints have included the following:
It has being intermittent and very hard to track down the issue.
The trouble report states that the call quality is poor and that calls are breaking up.
It was also stated that the overall network performance is very bad, and it started a few months ago but it is progressively getting worse.
It takes a long time to access any files or the Internet.
About 2 months ago, you implemented a network monitoring solution. You decided to check the logs as a result of a call you received from your CIO. The president of the college was on an important phone call and was not able to communicate as a result of the call quality. A review of your performance monitor logs revealed an enormous amount of traffic on the network. This excess network traffic was generated from the wireless LAN. Network traffic was destined for P2P (peer-to-peer) Web sites for movie and music downloads. The logs further reveal very high traffic volume when the students, staff, and faculty were off campus. You just remembered that the university did not have a wireless access control solution in place. It appears that unauthorized usage of the wireless network is generating this traffic that is greatly affecting network performance. You reported this finding to the CIO, and she needs a resolution.
Deliverable
Research and identify an enterprise wireless access control solution.
Based on your research, write a report of 1–2 pages for your boss on your solution to the above stated issues.
Explain how security mechanisms were employed.
Please submit your assignment.
For assistance with your assignment, please use your text, Web resources, and all course materials.
Grading Criteria
Project Criteria Exceeds: 90%–100% Very Good: 80%–89% Meets: 70%–79% Needs Improvement: Below 70%
Content
(75%)
Response covers all topics indicated in the assignment and adds additional content. Response covers most topics indicated in the assignment. Response covers many of the topics indicated in the assignment. Response covers none to some of the topics indicated in the assignment.
Effective Communication
(10%)
Demonstrates outstanding or exemplary application of written, visual, or oral skills. Demonstrates outstanding expression of topic, main idea, and purpose. Audience is addressed appropriately. Language clearly and effectively communicates ideas and content relevant to the assignment. Errors in grammar, spelling, and sentence structure are minimal. Organization is clear. Format is consistently appropriate to assignment. Presentation and delivery are confident and persuasive (where applicable). The writing was of collegiate level with no errors in spelling or grammar. Demonstrates very good written, visual, or oral skills. Demonstrates sound expression of topic, main idea, and purpose. Audience is usually addressed appropriately. Language does not interfere with the communication of ideas and content relevant to the assignment. Errors in grammar, spelling, and sentence structure are present, but do not distract from the message. Organization is apparent and mostly clear. Format is appropriate to assignment, but not entirely consistent. The writing was of collegiate level with two or less errors in spelling or grammar. Demonstrates acceptable written, visual, or oral skills. Demonstrates reasonable expression of topic, main idea, and purpose. Sometimes, audience is addressed appropriately. Language does not interfere with the communication of ideas and content relevant to the assignment. Errors in grammar, spelling, and sentence structure are present and may distract from the message. Organization is a bit unclear. Format is inconsistent. The writing was of collegiate level with several errors in spelling or grammar. Demonstrates inadequate or partially proficient application of written, visual, or oral skills. Demonstrates inadequate or partial expression of topic, main idea, and purpose. Audience is often not addressed appropriately. Language often impedes the communication of ideas and content relevant to the assignment. Errors in grammar, spelling, and sentence structure are frequent and often distract from meaning or presentation. Organization is inadequate, confusing, and distracting. The format is inadequate and obscures meaning. The writing was less than collegiate level with numerous errors in spelling or grammar.
Supporting Analysis
(15%)
Analysis exceeds minimum requirements. Sources are used to support analysis, are appropriate, and are properly referenced. Basic analysis provided to support assertions. Sources are cited, appropriate, and properly referenced. Limited analysis provided to support assertions. Some sources are cited, appropriate, and properly referenced. No or inaccurate analysis, no sources are cited when needed, analysis and/or sources are not appropriate. When sources are used, they are not properly referenced.
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more